Home | Latest News | Popular News | Our Network | About | Contact
SecurityPhresh - News that keeps you ahead of others!
Popular Security News
As Trump Courts Black Voters, Critics See A Depression Strategy
10 hours ago from Yahoo News
While the president’s team touts its efforts to court a community that Republicans have long ignored, critics describe them as part of a cynical “depression strategy” designed to minimize Black American turnout.
McConnell Vows To Move Forward With Replacing Ginsburg, But Does He Have The Votes?
6 hours ago from Yahoo News
Mitch McConnell vowed to hold a vote on a replacement for Ruth Bader Ginsburg, but the big question is whether he has the votes to confirm a Supreme Court Justice only six weeks before the presidential election. 
As Smoke Lifts On Californias Coast, It Lingers In Central Valley, Where Farmworkers Have No Refuge
36 hours ago from Yahoo News
Hazardous smoke from wildfires across the West is presenting the latest danger for the men and women who pick America’s fruit and vegetable crops.
Biden Looks To Engage Black Men On Issues — And Rapper Jeezy Approves
33 hours ago from Yahoo News
Former Vice President Joe Biden is hoping that barbershop conversations will equate to an increase in voter turnout for the Democratic presidential nominee among Black men in November.
Firefox Bug Lets You Hijack Nearby Mobile Browsers Via WiFi
12 hours ago from ZDNet
Mozilla says users should update as soon as possible to Firefox v79 for Android.
Republicans Tell The Truth About Biden Probe: “It Would Certainly Help Donald Trump Win Re-election”
29 hours ago from Yahoo News
Democrats compared the admission to Kevin McCarthys 2015 boast that the Benghazi probe was aimed to hurt Clinton
A Real-life Maze Ransomware Attack – “If At First You Don’t Succeed…”
18 hours ago from Naked Security
The crooks wanted $15,000,000. They didnt get it. Huzzah!
Mitch McConnell Rams Through Six Trump Judges In 30 Hours After Blocking Coronavirus Aid For Months
36 hours ago from Yahoo News
Planned Parenthood warned that many of the judges have hostile records toward human rights and abortion
See More
Latest Security News
McConnell Vows To Move Forward With Replacing Ginsburg, But Does He Have The Votes?
6 hours ago from Yahoo News
Mitch McConnell vowed to hold a vote on a replacement for Ruth Bader Ginsburg, but the big question is whether he has the votes to confirm a Supreme Court Justice only six weeks before the presidential election. 
As Trump Courts Black Voters, Critics See A Depression Strategy
10 hours ago from Yahoo News
While the president’s team touts its efforts to court a community that Republicans have long ignored, critics describe them as part of a cynical “depression strategy” designed to minimize Black American turnout.
Firefox Bug Lets You Hijack Nearby Mobile Browsers Via WiFi
12 hours ago from ZDNet
Mozilla says users should update as soon as possible to Firefox v79 for Android.
You Dont Need A Futuristic PC To Run Cyberpunk 2077, But You Might Want One
12 hours ago from PCWorld
Cyberpunk 2077 looks like a truly next-gen game from everything we’ve seen, but you won’t need a futuristic rig to run it. CD Projekt Red unveiled the system requirements for the hotly anticipated game on Friday, and they’re surprisingly...
The Best CPUs For Gaming: Next-gen Ryzen Chips Are Coming
13 hours ago from PCWorld
Buying a processor for a gaming rig isn’t as hard as it used to be. Now that Ryzen 3000-series and Intel’s 10th-gen Core CPUs come with more performance and cores than ever before, it’s hard to buy a stinker these days—especially...
See More
Latest News from Research Labs
Chinese Antivirus Firm Was Part Of APT41 ‘Supply Chain’ Attack
36 hours ago from Krebsonsecurity
The U.S. Justice Department this week indicted seven Chinese nationals for a decade-long hacking spree that targeted more than 100 high-tech and online gaming companies. The government alleges the men used malware-laced phishing emails...
Plugging In A Strange USB Drive – What Could Possibly Go Wrong?
41 hours ago from ESET Research
While wanting to return a found USB flash drive is commendable, you should avoid taking unnecessary risks, lest your device get infested and your data compromised. The post Plugging in a strange USB drive – What could possibly go wrong?...
Emotet Strikes Quebec’s Department Of Justice: An ESET Analysis
2 days ago from ESET Research
The cyber attack affects 14 inboxes belonging to the Department of Justice was confirmed by ESET researchers.  The post Emotet strikes Quebec’s Department of Justice: An ESET Analysis appeared first on WeLiveSecurity
Two Russians Charged In $17M Cryptocurrency Phishing Spree
3 days ago from Krebsonsecurity
U.S. authorities today announced criminal charges and financial sanctions against two Russian men accused of stealing nearly $17 million worth of virtual currencies in a series of phishing attacks throughout 2017 and 2018 that spoofed websites...
Sports Data For Ransom – It’s Not All Just Fun And Games Anymore
3 days ago from ESET Research
Sports and training data are more sophisticated and affordable than ever. With the democratization of (sports) performance data, are your personal information safe? The post Sports data for ransom – it’s not all just fun and games...
See More
Latest Security Videos & Podcasts
What’s Wrong With WebSocket APIs - Unveiling Vulnerabilities In WebSocket APIs - Mikhail Egorov
6 months ago from DeepSec
WebSocket protocol is many times more efficient than HTTP. In recent years we can observe that developers tend to implement functionality in the form of WebSocket APIs instead of traditional REST APIs, that use HTTP. Modern technologies...
What Has Data Science Got To Do With It - Thordis Thorsteins
6 months ago from DeepSec
In this talk I want to shed some light on data science’s place within security. You can expect to learn how to see through common data science jargon that’s used in the industry, as well as to get a high level understanding of what’s...
Well, That Escalated Quickly - A Penetration Testers Approach To Windows Privilege Escalation - Khalil Bijjou
6 months ago from DeepSec
Companies engage security experts to penetrate their infrastructures and systems in order to find vulnerabilities before malicious persons do. During these penetration tests, security experts often encounter Windows endpoints or servers...
The Turtle Gone Ninja - Investigation Of An Unusual Crypto-Mining Campaign - Ophir Harpaz And Daniel Goldberg
6 months ago from DeepSec
At first sight, Nansh0u is yet another attack campaign aiming to mine a marginal crypto-currency named TurtleCoin. However, things get much more interesting once you gain full access to the attacker’s infrastructure. Our investigation...
The Future Is Here - Modern Attack Surface On Automotive - Lior Yaari
6 months ago from DeepSec
Working as a security researcher for the automotive industry, I received futuristic equipment to test. Test? Hack! In two or three years from now, our vehicles will be full of communication interfaces to the outside world. V2X technologies,...
See More
Latest Security Papers & Presentations
Purple Fox Malware: What It Is, How It Works And How To Prevent It
3 days ago from InfoSec
Introduction Without question, there has been a marked die-off in the usage of Exploit Kits (EK). The Purple Fox exploit kit is a type of malware that is defying this recent trend and has had some...Go on to the site to read the full...
Cloud Pentesting Certification Boot Camp: The Ultimate Guide
3 days ago from InfoSec
What is a Certified Cloud Penetration Tester (CCPT) certification? The CCPT certification is offered by the Information Assurance Certification Review Board to validate an applicant’s skills in cloud...Go on to the site to read the full...
6 Windows Event Log IDs To Monitor Now
3 days ago from InfoSec
Introduction It’s possible to use Windows 10 event logs to detect intrusions and malicious activity, but some knowledge of critical IDs is mandatory to avoid over-collection and other issues. This...Go on to the site to read the full...
Time To Update Your Cybersecurity Policy?
4 days ago from InfoSec
Introduction In today’s highly connected world, new cyberthreats and risks emerge seemingly every hour, around the clock. Whether it is from spearphishing, a distributed denial-of-service attack or a...Go on to the site to read the full...
Ransomware Deletion Methods And The Canary In The Coal Mine
4 days ago from InfoSec
Introduction  Ransomware is an emergent threat. Every week, there is a new and notable outbreak of this class of data encryption malware. From Ragnar Locker to Netwalker, the threats are increasing,...Go on to the site to read the full...
See More